We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Security of IEEE 802.11 considering Power and EM Side-Channel Information
Rechberger C., Oswald M.
International Conference on Computing, Communications and Control Technologies (CCCT 2004), 129-133
Stream Ciphers and Side-Channel Analysis
Rechberger C., Oswald M.
SASC - The State of the Art of Stream Ciphers, 320-326
Practical Template Attacks
Rechberger C., Oswald M.
Information Security Applications, WISA - Workshop on Information Security Applications, 440-456, (Lecture Notes in Computer Science)
A Highly Regular and Scalable AES Hardware Architecture
Mangard S., Aigner M., Dominikus S.
IEEE Transactions on Computers, Vol. 52(4), 483-491
Exploiting Radiated Emissions - EM Attacks on Cryptographic ICs
Mangard S.
Proceedings of Austrochip 2003, Austrochip 2003, 13-16
A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion
Mangard S.
Information Security and Cryptology - ICISC 2002: 5th International Conference, Seoul, Korea, November 28-29, 2002. Revised Papers, International Conference on Information Security and Cryptology, 343-358, (Lecture Notes in Computer Science)
Recent trends in computer-aided verification
Bloem R.
CoLogNET Newsletter, Vol. 5, 1-2
Austrian e-Government and Citizen Card Initiatives
Leitold H., Posch R.
Proceedings of the 2nd NATO scientific conference on Security and Protection of Information, 7-14
Verification and Fault Localization for VHDL Programs
Bloem R., Wotawa F.
Telematik, Vol. 8(2), 30-33
Analysis of symbolic SCC hull algorithms
Bloem R., Somenzi F., Ravi K.
International Conference on Formal Methods in Computer-Aided Design, International Conference on Formal Methods in Computer-Aided Design, 88-105
Fair simulation minimization
Bloem R., Gurumurthy S., Somenzi F.
International Conference on Computer Aided Verification, Springer, 610-623
Identification and Confidentiality for e-Government
Leitold H., Posch R.
Certification and Security in E-Services: From E-Government to E-Business, 25-30
Low-cost AES
Rechberger C., Popp T., Tillich S.
Proceedings of Austrochip 2002, October 4, 2002, Graz, Austria, Austrochip 2008, 131-136
Elliptic Curve Cryptography in Practice — The Austrian Citizen Card for e-Government Applications
Großschädl J., Kamendje Tchokobou G., Oswald M., Posch R.
Proceedings of the International Conference on Advances in Infrastructure for Electronic Business, Education, Science and Medicine on the Internet (SSGRR 2002W), International Conference on Advances in Infrastructure for Electronic Business, Education, Science and Medicine on the Internet (SSGRR 2002W), -
A New Approach to DNS Security (DNSSEC)
Mangard S., Giuseppe A.
Proceedings of the Eighth ACM Conference on Computer and Communications Security (CCS-8), ACM Conference on Computer and Communications Security, 86-95
Search Techniques and Automata for Symbolic Model Checking
Bloem R.
, Doctoral Thesis
Divide and compose: SCC refinement for language emptiness
Wang C., Bloem R., Hachtel G., Ravi K., Somenzi F.
CONCUR 2001 - Concurrency Theory, International Conference on Concurrency Theory, 456-471, (Lecture notes in computer science)
A comparison of tree transductions defined by monadic second order logic and by attribute grammars
Bloem R., Engelfriet J.
Journal of Computer and System Sciences, Vol. 61(1), 1-50
An algorithm for strongly connected component analysis in n log n symbolic steps
Bloem R., Gabow H., Somenzi F.
International Conference on Formal Methods in Computer-Aided Design, International Conference on Formal Methods in Computer-Aided Design, 37-54
A comparative study of symbolic algorithms for the computation of fair cycles
Bloem R., Ravi K., Somenzi F.
International Conference on Formal Methods in Computer-Aided Design, International Conference on Formal Methods in Computer-Aided Design, 143-160